Техническая информация
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = '%ALLUSERSPROFILE%\Application Data\khp\wthhf.exe,explorer.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunOnce] 'to17434' = '%ALLUSERSPROFILE%\Application Data\ojj\yepbo.exe'
- '<SYSTEM32>\attrib.exe' -r -s -h <Имя вируса>.exe
- '<SYSTEM32>\cmd.exe' /c ""<Текущая директория>\tDvq1Tkw4lT.bat" <Имя вируса>.exe"
- '<SYSTEM32>\svchost.exe'
- <SYSTEM32>\alg.exe
- <SYSTEM32>\ctfmon.exe
- <SYSTEM32>\spoolsv.exe
- <SYSTEM32>\cmd.exe
- <SYSTEM32>\attrib.exe
- <SYSTEM32>\wbem\wmiprvse.exe
- <SYSTEM32>\cscript.exe
- %WINDIR%\Explorer.EXE
- <SYSTEM32>\csrss.exe
- <SYSTEM32>\smss.exe
- System
- <SYSTEM32>\winlogon.exe
- <SYSTEM32>\svchost.exe
- <SYSTEM32>\lsass.exe
- <SYSTEM32>\services.exe
- %WINDIR%\naly.yhp
- %ALLUSERSPROFILE%\Application Data\oocim\fulge.shb
- <Текущая директория>\tDvq1Tkw4lT.bat
- %ALLUSERSPROFILE%\Application Data\khp\wthhf.exe
- %ALLUSERSPROFILE%\Application Data\shq\hxikk.ypt
- %ALLUSERSPROFILE%\Application Data\lvq\hqkj.xyo
- %ALLUSERSPROFILE%\Application Data\ojj\yepbo.exe
- %ALLUSERSPROFILE%\Application Data\ojj\yepbo.exe
- %ALLUSERSPROFILE%\Application Data\khp\wthhf.exe
- 'nk##bh.net':80
- 'be###cud.com':80
- 'nt##ghst.ru':80
- DNS ASK be###cud.com
- DNS ASK nk##bh.net
- DNS ASK qh##plc.net
- DNS ASK microsoft.com
- DNS ASK nt##ghst.ru
- DNS ASK google.com
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: '(null)' WindowName: '(null)'